source: https://www.securityfocus.com/bid/6602/info
Geeklog is prone to a cross-site scripting vulnerability in the 'users.php' script.
This issue is due to insufficient sanitization of input submitted in URI parameters. As a result, an attacker may create a malicious link to a site hosting Geeklog, which contains malicious HTML or script code.
When such a link is visited by an unsuspecting user, attacker-supplied script code will be interpreted by their web client.
http://www.example.com/users.php?mode=profile&uid=<script>alert(document.cookie)</script>